Abstract
As computer operations become more diverse, distributed and complex the varieties of threats have increased. Although the more technical security breaches may now often be generated many miles from the main computer installation, using communications technology, they are still likely to be directed at data or software held and processed in the centre, and their chance of success will depend on the level of control over the computer installation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Copyright information
© 1991 Touche Ross Management Consultants
About this chapter
Cite this chapter
Slater, K. (1991). Security of Computer Operations. In: Information Security in Financial Services. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-12215-8_6
Download citation
DOI: https://doi.org/10.1007/978-1-349-12215-8_6
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-12217-2
Online ISBN: 978-1-349-12215-8
eBook Packages: Palgrave Economics & Finance CollectionEconomics and Finance (R0)